How the Air Force Plans to ‘Ruthlessly Attack’ Legacy Policies
Now, the challenges around remote work is not so much a technology issue but a policy one, said Rob Beutel, the Air Force’s Deputy Chief Information Technology Officer.
Now, the challenges around remote work is not so much a technology issue but a policy one, said Rob Beutel, the Air Force’s Deputy Chief Information Technology Officer.
The key to mitigating the risk of security threats is leveraging AI-driven analytics to continuously monitor user behavior for proactive threat detection.
Zero trust is not just a simple security solution, but a complex philosophy for improving cyber defenses. Are you communicating those changes to employees?
Having the necessary tools is step one for shifting to telework. Are organizations providing the necessary equipment, connection, access and security to employees?
In March 2020, GovLoop conducted a community survey on the state continuity of operations (COOP) across the federal, state and local levels. The survey found varying levels of continuity preparedness across different government organizations.
As the number of cloud users and applications grow, so do the number of servers needed. How can agencies ensure application availability, providing enough bandwidth that they’re highly responsive for users?
When the Coronavirus Aid, Relief and Economic Security Act (CARES) Act was passed in March, the Small Business Administration (SBA) was suddenly in charge of ten times the amount of usual funds to distribute to small businesses.
Cloud Smart focuses on three interrelated pillars that agencies and the private sector identified as keys to success: workforce, security and procurement.
Most organizations will adopt a hybrid, multi-cloud environment by 2021 to fit their complex needs. So here are three priorities your agency should focus on to manage a more complex environment.
Colorado emphasizes educating both their developers and non-developers about keeping application cyberthreats at bay.